perf/core: Fix unconditional security_locked_down() call
Description
In the Linux kernel, the following vulnerability has been resolved:
perf/core: Fix unconditional security_locked_down() call
Currently, the lockdown state is queried unconditionally, even though its result is used only if the PERF_SAMPLE_REGS_INTR bit is set in attr.sample_type. While that doesn't matter in case of the Lockdown LSM, it causes trouble with the SELinux's lockdown hook implementation.
SELinux implements the locked_down hook with a check whether the current task's type has the corresponding "lockdown" class permission ("integrity" or "confidentiality") allowed in the policy. This means that calling the hook when the access control decision would be ignored generates a bogus permission check and audit record.
Fix this by checking sample_type first and only calling the hook when its result would be honored.
Affected products
68- osv-coords67 versionspkg:rpm/suse/kernel-64kb&distro=SUSE%20Enterprise%20Storage%207.1pkg:rpm/suse/kernel-64kb&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-LTSSpkg:rpm/suse/kernel-64kb&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSSpkg:rpm/suse/kernel-default-base&distro=SUSE%20Enterprise%20Storage%207.1pkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP2-LTSSpkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-LTSSpkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20Micro%205.1pkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20Micro%205.2pkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP2-LTSSpkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSSpkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP2pkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20Enterprise%20Storage%207.1pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2015%20SP2pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2015%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP2-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP2pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Micro%205.1pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Micro%205.2pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP2-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP2pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3pkg:rpm/suse/kernel-docs&distro=SUSE%20Enterprise%20Storage%207.1pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP2-LTSSpkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-LTSSpkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP2-LTSSpkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSSpkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP2pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3pkg:rpm/suse/kernel-livepatch-SLE15-SP2_Update_47&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP2pkg:rpm/suse/kernel-livepatch-SLE15-SP3_Update_43&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP3pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Enterprise%20Storage%207.1pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP2-LTSSpkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-LTSSpkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP2-LTSSpkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSSpkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP2pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3pkg:rpm/suse/kernel-preempt&distro=SUSE%20Enterprise%20Storage%207.1pkg:rpm/suse/kernel-preempt&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP2-LTSSpkg:rpm/suse/kernel-preempt&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-LTSSpkg:rpm/suse/kernel-preempt&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP2-LTSSpkg:rpm/suse/kernel-preempt&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSSpkg:rpm/suse/kernel-preempt&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP2pkg:rpm/suse/kernel-preempt&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.1pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.2pkg:rpm/suse/kernel-source&distro=SUSE%20Enterprise%20Storage%207.1pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP2-LTSSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-LTSSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP2-LTSSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP2pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.1pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.2pkg:rpm/suse/kernel-syms&distro=SUSE%20Enterprise%20Storage%207.1pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP2-LTSSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-LTSSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP2-LTSSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP2pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3pkg:rpm/suse/kernel-zfcpdump&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSS
< 5.3.18-150300.59.158.1+ 66 more
- (no CPE)range: < 5.3.18-150300.59.158.1
- (no CPE)range: < 5.3.18-150300.59.158.1
- (no CPE)range: < 5.3.18-150300.59.158.1
- (no CPE)range: < 5.3.18-150300.59.158.1.150300.18.92.5
- (no CPE)range: < 5.3.18-150200.24.188.1.150200.9.95.3
- (no CPE)range: < 5.3.18-150300.59.158.1.150300.18.92.5
- (no CPE)range: < 5.3.18-150300.59.158.1.150300.18.92.5
- (no CPE)range: < 5.3.18-150300.59.158.1.150300.18.92.5
- (no CPE)range: < 5.3.18-150200.24.188.1.150200.9.95.3
- (no CPE)range: < 5.3.18-150300.59.158.1.150300.18.92.5
- (no CPE)range: < 5.3.18-150200.24.188.1.150200.9.95.3
- (no CPE)range: < 5.3.18-150300.59.158.1.150300.18.92.5
- (no CPE)range: < 5.3.18-150300.59.158.1
- (no CPE)range: < 5.3.18-150200.24.188.1
- (no CPE)range: < 5.3.18-150300.59.158.1
- (no CPE)range: < 5.3.18-150200.24.188.1
- (no CPE)range: < 5.3.18-150300.59.158.1
- (no CPE)range: < 5.3.18-150200.24.188.1
- (no CPE)range: < 5.3.18-150300.59.158.1
- (no CPE)range: < 5.3.18-150300.59.158.1
- (no CPE)range: < 5.3.18-150300.59.158.1
- (no CPE)range: < 5.3.18-150200.24.188.1
- (no CPE)range: < 5.3.18-150300.59.158.1
- (no CPE)range: < 5.3.18-150200.24.188.1
- (no CPE)range: < 5.3.18-150300.59.158.1
- (no CPE)range: < 5.3.18-150300.59.158.1
- (no CPE)range: < 5.3.18-150200.24.188.1
- (no CPE)range: < 5.3.18-150300.59.158.1
- (no CPE)range: < 5.3.18-150200.24.188.1
- (no CPE)range: < 5.3.18-150300.59.158.1
- (no CPE)range: < 5.3.18-150200.24.188.1
- (no CPE)range: < 5.3.18-150300.59.158.1
- (no CPE)range: < 1-150200.5.3.3
- (no CPE)range: < 1-150300.7.3.5
- (no CPE)range: < 5.3.18-150300.59.158.1
- (no CPE)range: < 5.3.18-150200.24.188.1
- (no CPE)range: < 5.3.18-150300.59.158.1
- (no CPE)range: < 5.3.18-150200.24.188.1
- (no CPE)range: < 5.3.18-150300.59.158.1
- (no CPE)range: < 5.3.18-150200.24.188.1
- (no CPE)range: < 5.3.18-150300.59.158.1
- (no CPE)range: < 5.3.18-150300.59.158.1
- (no CPE)range: < 5.3.18-150200.24.188.1
- (no CPE)range: < 5.3.18-150300.59.158.1
- (no CPE)range: < 5.3.18-150200.24.188.1
- (no CPE)range: < 5.3.18-150300.59.158.1
- (no CPE)range: < 5.3.18-150200.24.188.1
- (no CPE)range: < 5.3.18-150300.59.158.1
- (no CPE)range: < 5.3.18-150300.166.1
- (no CPE)range: < 5.3.18-150300.166.1
- (no CPE)range: < 5.3.18-150300.59.158.1
- (no CPE)range: < 5.3.18-150200.24.188.1
- (no CPE)range: < 5.3.18-150300.59.158.1
- (no CPE)range: < 5.3.18-150200.24.188.1
- (no CPE)range: < 5.3.18-150300.59.158.1
- (no CPE)range: < 5.3.18-150200.24.188.1
- (no CPE)range: < 5.3.18-150300.59.158.1
- (no CPE)range: < 5.3.18-150300.166.1
- (no CPE)range: < 5.3.18-150300.166.1
- (no CPE)range: < 5.3.18-150300.59.158.1
- (no CPE)range: < 5.3.18-150200.24.188.1
- (no CPE)range: < 5.3.18-150300.59.158.1
- (no CPE)range: < 5.3.18-150200.24.188.1
- (no CPE)range: < 5.3.18-150300.59.158.1
- (no CPE)range: < 5.3.18-150200.24.188.1
- (no CPE)range: < 5.3.18-150300.59.158.1
- (no CPE)range: < 5.3.18-150300.59.158.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- git.kernel.org/stable/c/08ef1af4de5fe7de9c6d69f1e22e51b66e385d9bmitre
- git.kernel.org/stable/c/4348d3b5027bc3ff6336368b6c60605d4ef8e1cemitre
- git.kernel.org/stable/c/b246759284d6a2bc5b6f1009caeeb3abce2ec9ffmitre
- git.kernel.org/stable/c/c7b0208ee370b89d20486fae71cd9abb759819c1mitre
- git.kernel.org/stable/c/f5809ca4c311b71bfaba6d13f4e39eab0557895emitre
News mentions
0No linked articles in our index yet.